Beyond the Data

October 14, 2011

Every wonder who may be accessing sensitive files on your servers and workstations? Haven't figured out how to track who is updating the most critical files in the offices you may have to manage? Well, this episode of Beyond the Data is for you.

If you cannot see the embedded video above, please visit beyondthedata.tv to watch this, and all other episodes. You can also follow the conversation there via Facebook and Twitter and leave your own thoughts and comments.

August 03, 2011

So for some time now we have heard IT Service Providers talk about the risk of backdoor accounts being created across client networks they manage. Or the fact people can be added to administrative groups when they aren't supposed to. The feeling is that it isn't easy to monitor for that.

If you cannot see the embedded video above, please visit beyondthedata.tv to watch this, and all other episodes. You can also follow the conversation there via Facebook and Twitter and leave your own thoughts and comments.

July 12, 2011

If there is one thing we are seeing from many of the IT Service Provider Providers that we work with, it is a disconnect between what Information Security Management (ISM) is about, and how to properly align ISM with the security safeguards that you know and love. In many cases, poor decisions can be made that exposes you to more business liability than you may like, and at times can feel very burdensome.

So we wanted to do something about it. Introducing 'Beyond the Data'... a new web series focused on doing just that. Every second Tuesday a new episode will be released that will guide you in aligning ISM with your safeguards to meet the requirements of ITIL. Check out the pilot below to get an idea what we will be talking about.